Thursday, 26 December 2013

ANDROID PROJECTS

I. ANDROID based CLOUD COMPUTING

1. Meeting scheduling system for multi-agent decition mechanisam, based on the ontology
   (IEEE 2013).
2. Building simple Program Analysis Tools Using an Extensible Java Compiler (IEEE 2013).
3. Implementing Energy as a Service in Android smartphone (IEEE 2013).

II. ANDROID based SURVEILLANCE

1. Legal Implications of Employee and physical-activity Monitoring System Using
   Android smartphone. (IEEE 2013).
2. Practical Camera Calibration From Moving Objects for Android platform (IEEE 2013).
3. Development of gps based Vehicle Theft Control System using Android smartphone.(IEEE 2013).

III. ANDROID based DATA MINING

1. Position sharing for offline location provider in Android platform (IEEE 2013).
2. Use multiplexing to increase information in QR code (IEEE 2013).

IV. ANDROID based WEB MINING

1. A Personal Mobile Commerce Pattern Mining and Prediction using Android
   smartphones(IEEE 2013).
2. Mobile social network for finding friends using Android smartphone (IEEE 2013).
3. Online Shopping Product Behavior in the Markets using Android smartphone (IEEE 2013).

V. ANDROID based REAL TIME APPLICATION SYSTEMS

1. Available car parking detection system using Android smart phones.
2. The application of capturing screen using Android smartphone.

VI. ANDROID based WEB SERVICES

1. Profile-based technique for Location in Android smartphone. 2. Find location using Privacy-Preserving Techniques in Android smartphone.




  • From city to village, there is a growing craze for smartphones and there is double the craze for Android-powered smartphones.
  • Android is Linux-based Open Source operating system that has completely revolutionized the smartphone usage experience.
  • Developing an app for Android is the favourite sport for numerous software developers all over the world.


  • First and foremost, it gives us immense pride to say that we are the best people in the city for developing apps for Android.
  • We offer innovative projects that are highly recognized and appreciate in the academic sector.
  • Web mining and Cloud Computing based on Android are the hot areas we are currently focusing on. Students associated with us have shown 100% satisfaction of the solution we have provided them.

IEEE-2013-Projects

IEEE-2013-Projects

 DOMAIN: Cloud Computing:
S.No.IEEE TITLEABSTRACTIEEE YEAR
1.   Toward Privacy Preserving and Collusion Resistance in a Location Proof Updating SystemBy leveraging virtual machine (VM) technology which provides performance and fault isolation, cloud resources can be provisioned on demand in a fine grained, multiplexed manner rather than in monolithic pieces. By integrating volunteer computing into cloud architectures, we envision a gigantic self-organizing cloud (SOC) being formed to reap the huge potential of untapped commodity computing power over the Internet. Toward this new architecture where each participant may autonomously act as both resource consumer and provider, we propose a fully distributed, VM-multiplexing resource allocation scheme to manage decentralized resources. Our approach not only achieves maximized resource utilization using the proportional share model (PSM), but also delivers provably and adaptively optimal execution efficiency. We also design a novel multiattribute range query protocol for locating qualified nodes. Contrary to existing solutions which often generate bulky messages per request, our protocol produces only one lightweight query message per task on the Content Addressable Network (CAN). It works effectively to find for each task its qualified resources under a randomized policy that mitigates the contention among requesters. We show the SOC with our optimized algorithms can make an improvement by 15-60 percent in system throughput than a P2P Grid model. Our solution also exhibits fairly high adaptability in a dynamic node-churning environment.2013
2.   Scalable and Secure Sharing of Personal Health Records in Cloud Computing Using Attribute-Based EncryptionPersonal health record (PHR) is an emerging patient-centric model of health information exchange, which is often outsourced to be stored at a third party, such as cloud providers. However, there have been wide privacy concerns as personal health information could be exposed to those third party servers and to unauthorized parties. To assure the patients’ control over access to their own PHRs, it is a promising method to encrypt the PHRs before outsourcing. Yet, issues such as risks of privacy exposure, scalability in key management, flexible access, and efficient user revocation, have remained the most important challenges toward achieving fine-grained, cryptographically enforced data access control. In this paper, we propose a novel patient-centric framework and a suite of mechanisms for data access control to PHRs stored in semitrusted servers. To achieve fine-grained and scalable data access control for PHRs, we leverage attribute-based encryption (ABE) techniques to encrypt each patient’s PHR file. Different from previous works in secure data outsourcing, we focus on the multiple data owner scenario, and divide the users in the PHR system into multiple security domains that greatly reduces the key management complexity for owners and users. A high degree of patient privacy is guaranteed simultaneously by exploiting multiauthority ABE. Our scheme also enables dynamic modification of access policies or file attributes, supports efficient on-demand user/attribute revocation and break-glass access under emergency scenarios. Extensive analytical and experimental results are presented which show the security, scalability, and efficiency of our proposed scheme.2013
3.   On Data Staging Algorithms for Shared Data Accesses in CloudsIn this paper, we study the strategies for efficiently achieving data staging and caching on a set of vantage sites in a cloud system with a minimum cost. Unlike the traditional research, we do not intend to identify the access patterns to facilitate the future requests. Instead, with such a kind of information presumably known in advance, our goal is to efficiently stage the shared data items to predetermined sites at advocated time instants to align with the patterns while minimizing the monetary costs for caching and transmitting the requested data items. To this end, we follow the cost and network models in [1] and extend the analysis to multiple data items, each with single or multiple copies. Our results show that under homogeneous cost model, when the ratio of transmission cost and caching cost is low, a single copy of each data item can efficiently serve all the user requests. While in multicopy situation, we also consider the tradeoff between the transmission cost and caching cost by controlling the upper bounds of transmissions and copies. The upper bound can be given either on per-item basis or on all-item basis. We present efficient optimal solutions based on dynamic programming techniques to all these cases provided that the upper bound is polynomially bounded by the number of service requests and the number of distinct data items. In addition to the homogeneous cost model, we also briefly discuss this problem under a heterogeneous cost model with some simple yet practical restrictions and present a 2-approximation algorithm to the general case. We validate our findings by implementing a data staging solver, whereby conducting extensive simulation studies on the behaviors of the algorithms.2013

COMPUTER SCIENCE AND ENGINEERING DEPARTMENT

Vision:
To impart high quality training to students so as to provide human resource appropriate to the local and national needs. To create and disseminate knowledge for the betterment of mankind in general and rural masses in particular. To establish centers of excellence in collaboration with industries, research laboratories and other agencies to meet the changing needs of society.


Objectives:

  • To achieve academic excellence and 100% placements for the students
  • To develop department intranet providing groupware tools for the faculty, courses and study materials for the students.
  • To conduct at least one faculty development program every semester
  • To conduct National and International conferences regularly.
  • To conduct seminars and workshops regularly.
  • To promote research and development activities among the faculty and students

Wednesday, 18 December 2013

JAVA INTERVIEW QUESTIONS AND ANSWERS

1. What is the difference between private, protected, and public?

These keywords are for allowing privileges to components such as java methods and variables.

Monday, 9 December 2013

What Is Soft Computing?

What Is Soft Computing?
Soft computing differs from conventional (hard) computing in that, unlike hard computing, it is tolerant of imprecision, uncertainty, partial truth, and approximation. In effect, the role model for soft computing is the human mind.

FREE HIT COUNTERS